Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06) 2006
DOI: 10.1109/ccgrid.2006.1630903
|View full text |Cite
|
Sign up to set email alerts
|

Structured Overlay without Consistent Hashing: Empirical Results

Abstract: Consistent hashing is at the core of many P2P protocols. It evenly distributes the keys over the nodes, thereby enabling logarithmic routing effort 'with high probability'. However, consistent hashing incurs unnecessary overhead as shown in this paper.By removing consistent hashing from Chord, we derived a protocol that has the same favorable logarithmic routing performance but needs less network hops for updating its routing table. Additionally, our Chord # protocol supports range queries, which are not possi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…It uses symmetric data replication [8] on top of a structured overlay like Chord [20] or Chord # [17]. In contrast to many other key/value stores, Scalaris provides strong data consistency.…”
Section: Scalaris: Replicated Data On Structured Overlaysmentioning
confidence: 99%
“…It uses symmetric data replication [8] on top of a structured overlay like Chord [20] or Chord # [17]. In contrast to many other key/value stores, Scalaris provides strong data consistency.…”
Section: Scalaris: Replicated Data On Structured Overlaysmentioning
confidence: 99%
“…Although a lot of extensions have been proposed for Chord, such as biasing Id assignment to load balance data over nodes [25] and network-awareness to reduce latencies [31], we consider these issues to be outside the scope of this paper. However, one extension we provide that is an address caching mechanism to preserve connection information for future session establishment.…”
Section: Usurp Sonmentioning
confidence: 99%
“…Each node that is part of the DHT is responsible for at least one subrange in the identifier space. Examples for DHTs are DKS [4], Chord [1], Chord# [2] and CAN [10]. There exist a number of storage systems which are built on DHTs, e.g.…”
Section: Problem Descriptionmentioning
confidence: 99%